White House drafts order to protect US industries from cyberattack after ...
WASHINGTON - The Obama administration is preparing an executive order with new rules to protect U.S. computer systems, after Congress failed earlier this summer to pass a cybersecurity bill.www.washingtonpost.com
Anonymous' daddy issues: GoDaddy restored after cyber-attack
A lone hacker claiming to be a member of the hacktivist collective Anonymous is claiming the credit for the cyber-attack that hit GoDaddy servers Monday.dailycaller.com
Protecting Americans from Cyber Attack
With Congress back in session and during a month when we pause to remember the tragic terrorist attacks of 9/11, it is time to get rid of partisan gridlock, and work together to pass a number of important bills including one that is vital to America's ...www.mccookgazette.com
Saudi Aramco's Computer Network Recovers After Cyber Attack
Saudi Arabian Oil Co., the world's largest crude exporter, said its computer network has recovered fully after a cyber attack last month and it is investigating the incident. The state-owned oil company, known as Saudi Aramco, said the virus had no ...www.bloomberg.com
White House drafting standards to guard US against cyberattack, officials say
The draft order, whose contours are being debated, would create voluntary standards to guide companies in guarding themselves against cyberattacks, according to administration officials. It would also establish a special council made up of key ...www.washingtonpost.com
Debora Plunkett, NSA's Cyber Defense Director, Says Foreign Cyber Attacks Are ...
NEW YORK (Reuters) - Other nations are increasingly employing cyber attacks without "any sense of restraint," a top U.S.www.huffingtonpost.com
Companies can't ignore cyberattack threats, iCollege chancellor warns
He'll bring strategies for CIOs to prepare for cyberattacks. Funded by the U.S. Department of Defense, NDU educates public sector leaders and corporate executives on defense; the iCollege focuses on IT strategies, including cybersecurity.www.crainsdetroit.com
Japanese defense panel: Cyber attacks can be basis for military self-defense
A Japanese military panel on Friday released a new set of guidelines for dealing with cyber attacks against the nation, saying that in certain circumstances they could warrant a military response.www.pcworld.com
Ahn's fan Web site hit by cyber attack
11 (Yonhap) -- An Internet Web site supporting Ahn Cheol-soo, an entrepreneur-turned-professor known to have political ambitions, has come under a cyber attack, according to its operator Tuesday. Ahnsamo said some 10,000 accounts of illegal advertising ...english.yonhapnews.co.kr
Hundreds more cyber attacks linked to 2009 Google breach
BOSTON -- The hacker group that attacked Google (GOOG) in 2009 has launched hundreds of other cyber assaults since then, focusing on U.S.www.mercurynews.com
The ethos of civilian cyber warriors
A recently published study claims that individuals who commit cyber-attacks against government entities also tend to download music illegally and participate in physical protests.www.tgdaily.com
NSA Official: Cyber Attacks Becoming More And More "Reckless"
Plunkett's complaints of unrestrained cyber attacks is somewhat ironic as the Obama administration has reported launched its own aggressive cyber campaign against international targets like Iran's nuclear reactors.www.redorbit.com
US leaders must prepare for threat of cyber attacks: Henry F. Cooper, special ...
It was recently revealed that the U.S. government was likely engaged in two very sophisticated cyber attacks: one that spied on Iran's nuclear program, another that slowed it by destroying centrifuges.www.statesman.com
Most 'dangerous' celebrity Emma Watson for cyber, malware attacks
Because Emma is the most "dangerous" celebrity to conduct online searches for, you risk a one in eight chance of being caught in a cyber attack because you wanted to see "who she wore" on the red carpet. Emma Watson, 22, joins a list of other ...www.examiner.com
Hundreds more cyber attacks linked to Google breach of 2009
Google said in January 2010 that it and more than 20 other companies were the victims of a sophisticated cyber attack later dubbed Operation Aurora from China-based hackers that resulted in the theft of intellectual property.gadgets.ndtv.com
Afghanistan Cyber Attack: Lt. Gen. Richard P. Mills Claims To Have Hacked The ...
The U.S. military has been launching cyberattacks against its opponents in Afghanistan, a senior officer says, making an unusually explicit acknowledgment of the oft-hidden world of electronic warfare.www.huffingtonpost.com
Massive Cyberattack: Act 1 Of Israeli Strike On Iran?
The alleged war plan that was recently leaked said an Israeli strike would begin with an unprecedented cyberattack designed to paralyze the Iranian regime and blind it to what was happening on its territory.www.npr.org
Japan's Sony hit by fresh cyberattack
Sony said Thursday that hackers stole details belonging to hundreds of its mobile unit clients, the latest in a string of cyberattacks to hit the embattled Japanese electronics giant. Sony said Thursday that hackers stole details belonging to hundreds ...phys.org
Connecting the Dots After Cyberattack on Saudi Aramco
Publicly released details of a cyberattack on Saudi Aramco, the world's largest oil producer, appear to confirm reports that critical data on three-quarters of the company's PCs was replaced with the image of a burning American flag.bits.blogs.nytimes.com
Cyberattacks on the Rise: Report
... held - to be compromised. The ability of cybercriminals to spend that much time focusing on the details of your life stems from another trend McAfee spotted - attacks are becoming much more targeted.www.cnbc.com
Tuesday, September 11, 2012
Cyberattack
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment